JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
This thesis work studied on digital image encryption algorithms performed towards JPEG images. With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. The intended recipient will be given a decryption key in which only with this key the receiver ca...
| Main Author: | Abu, Ahmad Zaidee |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2008
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/5410/ http://psasir.upm.edu.my/id/eprint/5410/1/FK_2008_38.pdf |
Similar Items
S-Permutability, Semipermutability, c-Normality And
c-Permutability Of Subgroups In Finite Groups
by: Al-Sharo, Doa'a Mustafa
Published: (2014)
by: Al-Sharo, Doa'a Mustafa
Published: (2014)
Bottleneck-based heuristic for permutation flowshop scheduling
by: Isa, Noor Amira
Published: (2017)
by: Isa, Noor Amira
Published: (2017)
Permutation groups in automata diagrams
by: Gan, Yee Siang, et al.
Published: (2013)
by: Gan, Yee Siang, et al.
Published: (2013)
Permutation flow shop scheduling: fuzzy particle swarm optimization approach
by: Ling, S., et al.
Published: (2011)
by: Ling, S., et al.
Published: (2011)
Methodology to develop bottleneck-based heuristic for permutation flow shop scheduling
by: Isa, Noor Amira, et al.
Published: (2020)
by: Isa, Noor Amira, et al.
Published: (2020)
Sticker systems over permutation groups
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2013)
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2013)
An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
by: Ariffin, Suriyani, et al.
Published: (2012)
by: Ariffin, Suriyani, et al.
Published: (2012)
Genuine multipartite nonlocality of permutationally invariant Gaussian states
by: Xu, Buqing, et al.
Published: (2017)
by: Xu, Buqing, et al.
Published: (2017)
Splicing systems over permutation groups of length two
by: Hamzah, Nur Zatul Akmar, et al.
Published: (2012)
by: Hamzah, Nur Zatul Akmar, et al.
Published: (2012)
The hidden permutation model and location-based activity recognition
by: Bui, H.H., et al.
Published: (2008)
by: Bui, H.H., et al.
Published: (2008)
New recursive circular algorithm for listing all permutations
by: Karim, Sharmila, et al.
Published: (2014)
by: Karim, Sharmila, et al.
Published: (2014)
Multiple bottlenecks sorting criterion at initial sequence in solving permutation flow shop scheduling problem
by: N. A., Isa, et al.
Published: (2021)
by: N. A., Isa, et al.
Published: (2021)
A guided artificial bee colony (GABC) heuristic for permutation flowshop scheduling problem (PFSP)
by: Sidek, Noor Azizah
Published: (2021)
by: Sidek, Noor Azizah
Published: (2021)
Constructivist approach to multimedia design for interactive content in discrete mathematic
(permutation and combination) / Adzlan Ahmad
by: Ahmad, Adzlan
Published: (2005)
by: Ahmad, Adzlan
Published: (2005)
Permutation entropy based full-reference image
quality qssessment
by: Baqar, Mohtashim *, et al.
Published: (2019)
by: Baqar, Mohtashim *, et al.
Published: (2019)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
URASP: an ultralightweight RFID authentication scheme using permutation operation
by: Mohd Shariq, et al.
Published: (2021)
by: Mohd Shariq, et al.
Published: (2021)
POVM construction: a simple recipe with applications to
symmetric states
by: Sirsi, Swarnamala, et al.
Published: (2017)
by: Sirsi, Swarnamala, et al.
Published: (2017)
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
by: Salem Hussin, Saleh Hussin
Published: (2005)
by: Salem Hussin, Saleh Hussin
Published: (2005)
Modified Neh Heuristic On Makespan Reduction In Permutation Flow Shop Problems
by: Chong, Zheng Ziao
Published: (2015)
by: Chong, Zheng Ziao
Published: (2015)
Domain transformation approach to deterministic optimization of examination timetables
by: Abdul Rahim, Siti, et al.
Published: (2013)
by: Abdul Rahim, Siti, et al.
Published: (2013)
Some properties of semi-simple splicing system over some permutation groups
by: Selvarajoo, Mathuri, et al.
Published: (2013)
by: Selvarajoo, Mathuri, et al.
Published: (2013)
Combining Monte-Carlo and hyper-heuristic methods for the multi-mode resource-constrained multi-project scheduling problem
by: Asta, Shahriar, et al.
Published: (2016)
by: Asta, Shahriar, et al.
Published: (2016)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
Medical image compression evaluation by JPEG and JPEG 2000
by: Haseeb, Shariq, et al.
Published: (2014)
by: Haseeb, Shariq, et al.
Published: (2014)
Strict Authentication Watermaking with Jpeg Compression (SAW-JPEG)
by: Jasni, Mohamad Zain
Published: (2008)
by: Jasni, Mohamad Zain
Published: (2008)
Covariance analysis for temporal data, with applications to DNA modelling
by: Dryden, Ian L., et al.
Published: (2017)
by: Dryden, Ian L., et al.
Published: (2017)
Analysis for McEliece and Niederreiter Encryptions: An Alternative to Public Key Encryption
by: Chaw, Lian Foong
Published: (2018)
by: Chaw, Lian Foong
Published: (2018)
Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images
by: Al-Razzaq Abd, Hayder Abd
Published: (2015)
by: Al-Razzaq Abd, Hayder Abd
Published: (2015)
JPEG2000 & JPEG : Objective And Subjective Quality Measures For Lossily Compressed Medical Images
by: Oh , Tick Hui
Published: (2003)
by: Oh , Tick Hui
Published: (2003)
JPEG2000 & JPEG : Objective And Subjective Quality Measures For Lossily Compressed Medical Images
by: Oh, Tick Hui
Published: (2003)
by: Oh, Tick Hui
Published: (2003)
Identifying collagen bundles in the most superficial layer of normal articular cartilage
by: Duan, X., et al.
Published: (2009)
by: Duan, X., et al.
Published: (2009)
FPGA implementation of RSA encryption engine with flexible key size
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2007)
Message based random variable length key encryption algorithm.
by: Mirvaziri, Hamid, et al.
Published: (2009)
by: Mirvaziri, Hamid, et al.
Published: (2009)
New Directions in Commercial Secrecy and Encryption Protocols
by: Ashman, Helen
Published: (2001)
by: Ashman, Helen
Published: (2001)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Computed radiography and direct radiography of chest radiographic imaging: a comparision of image quality and entrance skin dose for various systems
by: Sun, Zhonghua, et al.
Published: (2009)
by: Sun, Zhonghua, et al.
Published: (2009)
JPEG 2000 Image Compression Using Wavelet Transforms
by: Yong, Joseph Chun Seong
Published: (2006)
by: Yong, Joseph Chun Seong
Published: (2006)
Turbo Codes For Error Control In JPEG Image Transmission
by: Ramasamy, K.
Published: (2005)
by: Ramasamy, K.
Published: (2005)
Similar Items
-
S-Permutability, Semipermutability, c-Normality And
c-Permutability Of Subgroups In Finite Groups
by: Al-Sharo, Doa'a Mustafa
Published: (2014) -
Bottleneck-based heuristic for permutation flowshop scheduling
by: Isa, Noor Amira
Published: (2017) -
Permutation groups in automata diagrams
by: Gan, Yee Siang, et al.
Published: (2013) -
Permutation flow shop scheduling: fuzzy particle swarm optimization approach
by: Ling, S., et al.
Published: (2011) -
Methodology to develop bottleneck-based heuristic for permutation flow shop scheduling
by: Isa, Noor Amira, et al.
Published: (2020)